Page 13 of 68 results (0.014 seconds)

CVSS: 3.3EPSS: 2%CPEs: 55EXPL: 0

libvirtd in libvirt before 0.9.0 does not use thread-safe error reporting, which allows remote attackers to cause a denial of service (crash) by causing multiple threads to report errors at the same time. libvirtd de libvirt en versiones anteriores a la 0.9.0 no utiliza el reporte de errores "thread-safe", lo que permite a atacantes remotos provocar una denegación de servicio (caída) provocando que múltiples hilos reporten errores al mismo tiempo. • http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=f44bfb7fb978c9313ce050a1c4149bf04aa0a670 http://secunia.com/advisories/44459 http://securitytracker.com/id?1025477 http://support.avaya.com/css/P8/documents/100134583 http://www.debian.org/security/2011/dsa-2280 http://www.redhat.com/support/errata/RHSA-2011-0478.html http://www.redhat.com/support/errata/RHSA-2011-0479.html http://www.securityfocus.com/bid/47148 http://www.ubuntu.com/usn/USN-1152-1 https://bugzilla.redhat. • CWE-399: Resource Management Errors •

CVSS: 6.9EPSS: 7%CPEs: 1EXPL: 0

libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086. libvirt.c en la API de Red Hat libvirt v0.8.8 no restringe correctamente las operaciones en una conexión de solo lectura, lo que podría permitir a atacantes remotos provocar una denegación de servicio (caida del sistema operativo) o posiblemente ejecutar código de su elección a través de una llamada (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, o (6) virConnectDomainXMLToNative, una vulnerabilidad diferente de CVE-2008-5086. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617773 http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=71753cb7f7a16ff800381c0b5ee4e99eea92fed3 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056209.html http://lists.opensuse.org/opensuse-updates/2011-04/msg00022.html http://openwall.com/lists/oss-security/2011/03/09/3 http://openwall.com/lists/oss-security/2011/03/10/5 http://secunia.com/advisories/43670 http://secunia.com/advisories/43780 http://secunia& • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 33EXPL: 0

Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree. Red Hat libvirt v0.2.0 hasta v0.8.2 crea reglas de iptable con asignaciones inadecuadas de puertos de origen privilegiados, lo que permite a usuarios invitados del SO evitar las restricciones de acceso establecidas aprovechando los valores de dirección IP y puerto-origen, como se ha demostrado copiando y eliminando un arbol de ficheros NFS. • http://libvirt.org/news.html http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html http://ubuntu.com/usn/usn-1008-1 http://ubuntu.com/usn/usn-1008-2 http://ubuntu.com/usn/usn-1008-3 http://www.redhat.com/support/errata/RHSA-2010-0615.html http://www.vupen.com/english/advisories/2010/2062 http • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.4EPSS: 0%CPEs: 9EXPL: 0

Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing stores without extracting the defined disk backing-store format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors. Red Hat libvirt, posiblemente v0.7.2 hasta v0.8.2, se repite en almacenes de respaldo de imagen de disco sin extraer el formato de disco de respaldo definido, lo cual puede permitir a usuarios invitados del Sistema Operativo leer ficheros a su elección en el Sistema Operativo anfitrión, y posiblemente tener otros impactos no especificados, a través de vectores desconocidos. • http://libvirt.org/news.html http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html http://ubuntu.com/usn/usn-1008-1 http://ubuntu.com/usn/usn-1008-2 http://ubuntu.com/usn/usn-1008-3 http://www.vupen.com/english/advisories/2010/2763 https://bugzilla.redhat.com/show_bug.cgi?id=607811 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.4EPSS: 0%CPEs: 17EXPL: 0

Red Hat libvirt, possibly 0.6.0 through 0.8.2, creates new images without setting the user-defined backing-store format, which allows guest OS users to read arbitrary files on the host OS via unspecified vectors. Red Hat libvirt, posiblemente v0.6.0 hasta v0.8.2, crea nuevas imagenes sin configurar el formato definido por el usuario backing-store, lo que permite a usuarios invitados al SO leer ficheros de su elección en el SO anfitrión a través de vectores sin especificar. • http://libvirt.org/news.html http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html http://ubuntu.com/usn/usn-1008-1 http://ubuntu.com/usn/usn-1008-2 http://ubuntu.com/usn/usn-1008-3 http://www.redhat.com/support/errata/RHSA-2010-0615.html http://www.vupen.com/english/advisories/2010/2062 http • CWE-264: Permissions, Privileges, and Access Controls •